Pages:
Author

Topic: How long will existing encryption last? - page 6. (Read 2214 times)

full member
Activity: 224
Merit: 120
December 13, 2019, 09:24:57 AM
#11
There will be much more implemented and worth solutions in the near future i am sure of that.
You can take for instance our current encryption systems in everywhere you go from password to 2fa to public and private keys acessing SSH.

Surely the best would be to increase max encryption byte sizes but that's way more complex to talk about it here.

About bitcoin you can expect something newer sooner or later till some hacker gets some cracking implementation.
If it gets cracked (assuming private keys hacked) developers will jump into and make it stronger.

That's when existing encryption will no longer exist and new one emerge.
---------------------------
When you talk about SSH, you are actually talking about a protocol that is based on an asymmetric RCA system.

Good old system. The key length for this system is now 4096 bits. It seems like they’re not using it anymore.

To protect against quantum attacks (we are not discussing cryptanalysis, which is much more dangerous), the minimum key for this system should be 15,300 bits or 16,386 bits in machine form.
But why not use them?
Because the load on the computer will increase so that you do not like it.

And what can we say about post-quantum encryption, there the key lengths (in asymmetric systems) are so large that I don’t want to write.

In addition, you still have the main problem - the problem of confirming that this is your pair - public and private keys. After all, before you, anyone can generate them. And these are X.509 certificates of trust with all the ensuing consequences and risks.

In general, we again come to the traditional system of trust that we have been forced upon. And again we get all its charms - hacking, phishing, hacker attack on your computer to steal your keys, etc.

So this is not an option, this is the molding of old cryptography systems into a new protocol. Nothing really safe.
sr. member
Activity: 625
Merit: 258
December 13, 2019, 08:42:00 AM
#10
There will be much more implemented and worth solutions in the near future i am sure of that.
You can take for instance our current encryption systems in everywhere you go from password to 2fa to public and private keys acessing SSH.

Surely the best would be to increase max encryption byte sizes but that's way more complex to talk about it here.

About bitcoin you can expect something newer sooner or later till some hacker gets some cracking implementation.
If it gets cracked (assuming private keys hacked) developers will jump into and make it stronger.

That's when existing encryption will no longer exist and new one emerge.
full member
Activity: 224
Merit: 120
December 13, 2019, 08:35:36 AM
#9
Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

It will take a long ass time before Google hits the sweet spot for cracking the algorithm. Heck, our lifetimes may not be enough to see the light at the end of that said tunnel. Needless to say, bitcoin's current encryption is still good to go and is currently quantum resistant by any means. Also, there's no way large companies such as Google will ever use their quantum computers on doing such, and may just use the tech into something else, especially theoretical modeling and running simulations of other important things.
----------------------------
The Google company itself may not be doing this, although it is not the only one who makes a quantum computer.

But strangers will do this for two reasons:

1. All companies that publicly announce the construction of a quantum computer - all provide access to it on a commercial basis!
This is a disturbing fact. And the Amazon company - purposefully plans to deal only with such services and writing quantum software.

2. Think of those who are used to stealing.

And most importantly, cryptanalysts. Their mathematical methods reduce the number of options that need to be sorted out. And quantum computing is what they need.

If a simple search and a simple computer need 10,000 years, then a quantum one - 3 minutes. This is without mathematical methods. If you use cryptanalysis, then reduce this time by 1000 times.

But I'm not talking about this, but about the fact that this happened in 2015-2016, that cryptography on elliptic curves became dangerous? Then there were still no quantum computers.
legendary
Activity: 3542
Merit: 1352
Cashback 15%
December 13, 2019, 08:11:13 AM
#8
Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

It will take a long ass time before Google hits the sweet spot for cracking the algorithm. Heck, our lifetimes may not be enough to see the light at the end of that said tunnel. Needless to say, bitcoin's current encryption is still good to go and is currently quantum resistant by any means. Also, there's no way large companies such as Google will ever use their quantum computers on doing such, and may just use the tech into something else, especially theoretical modeling and running simulations of other important things.
full member
Activity: 224
Merit: 120
December 13, 2019, 08:06:44 AM
#7
Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

LOL, do you think that quantum computers will be mass produces if ever they successfully crack 2^256 code? so it will not be for everyone's used. And for the record, there are a lot of development from behind. So far the following are candidates.

[1] Lamport Signature - (https://en.wikipedia.org/wiki/Lamport_signature#Public_key_for_multiple_messages)

[2] Multivariate cryptography - (https://en.wikipedia.org/wiki/Multivariate_cryptography)

[3] Lattice-based cryptography - (https://en.wikipedia.org/wiki/Lattice-based_cryptography)

for the record though, bitcoin addresses are not at risk to attack not unless the attacker know your public key. The only way to attack us is that if the QC is fast enough to obtain our public key in a few minutes based on our private key.
---------------------------------------------
The cryptographic post-quantum systems you have indicated are well known for a long time and all of them have their drawbacks and advantages. You have not yet indicated everything, there are more of them.

And they were known far until 2015, when NIST announced a competition and this competition was supposed to end 2017-2018, but it continues to this day. Why do this if cryptography on elliptical circles is reliable?

Shore Algorithm? So increase the key length and no contests are needed.

For reference, I note that the 256-bit AES key = is 512 ECC and equal to 15300 bit RCA.

Why did they need a new encryption system if you can simply increase the ECC to 512 bits?
full member
Activity: 224
Merit: 120
December 13, 2019, 07:53:23 AM
#6
Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

LOL, do you think that quantum computers will be mass produces if ever they successfully crack 2^256 code? so it will not be for everyone's used. And for the record, there are a lot of development from behind. So far the following are candidates.

[1] Lamport Signature - (https://en.wikipedia.org/wiki/Lamport_signature#Public_key_for_multiple_messages)

[2] Multivariate cryptography - (https://en.wikipedia.org/wiki/Multivariate_cryptography)

[3] Lattice-based cryptography - (https://en.wikipedia.org/wiki/Lattice-based_cryptography)

for the record though, bitcoin addresses are not at risk to attack not unless the attacker know your public key. The only way to attack us is that if the QC is fast enough to obtain our public key in a few minutes based on our private key.
-------------------------------------
When you talk about a 256-bit key, it’s only, exclusively, in a symmetric cryptographic system — this code can and should be sorted out completely. In other words, the key can be any of the possible values ​​of 256 bits (in fairness, it should be noted that not every single option can be a key even in a symmetric system, there are weak keys that are unacceptable, but there are an insignificant number of them).

If we are talking about asymmetric cryptography, then not all options from two to the power of 256 can be keys.

If you are afraid of quantum computers, then this is not the danger that you should pay attention to.

Although, it is asymmetric systems that can easily be opened with the Shore algorithm in the presence of quantum computing.

I persistently draw your attention to the danger of elliptical cryptography in the case of cryptanalysis, or in other words, a mathematical attack, rather than brute force attack.

Check the facts:
-----------------------------------
The American mathematician and cryptographer Neil Koblitz, is (along with Victor Miller) one of those two people who in 1985 simultaneously and independently came up with a new public-key crypto scheme, called ECC (this, we recall, is an abbreviation for Elliptic Curve Cryptography , that is, "cryptography on elliptic curves").

Without going deep into the technical details of this method and its difference from the RSA cryptographic scheme that appeared earlier, we note that ECC has obvious advantages from the point of view of practical operation, since the same theoretical stability of the algorithm is provided with a much shorter key length (for comparison: 256-bit ECC operations are equivalent to working with a 3072-bit module in RSA). And this greatly simplifies the calculations and significantly improves the system performance.

The second important point (almost certainly related to the first) is that the extremely secretive NSA in its cryptographic preferences from the very beginning began to lean in favor of ECC. (!)

In the early years and decades, this reached the academic and industrial circles only in an implicit form (when, for example, in 1997, an official of the NSA, Jerry Solinas, first spoke at the Crypto public conference - with a report on their modification of the famous Koblitz scheme).
Well, then, it was already documented. In 2005, the NSA published its recommendations on cryptographic algorithms, in the form of the so-called Suite B (“Set B”) - a set of openly published ciphers for hiding secret and top-secret information in national communication systems.
All the basic components of this document were built on the basis of ECC, and for RSA, the auxiliary role of the “first generation” (!) Was assigned, necessary only for a smooth transition to a new, more efficient cryptography on elliptic curves ... (!)

Now we need to remember about Alfred Menezes, the second co-author of the article about "Puzzle, shrouded in a riddle." The Canadian mathematician and cryptographer Menezes has been working at the University of Waterloo, one of the most famous centers of open academic cryptography, all his scientific life since the mid-1980s. It was here that in the 1980s, three university professors created Certicom, a company that developed and commercialized cryptography on elliptic curves.

Accordingly, Alfred Menezes eventually became not only a prominent Certicom developer and author of several authoritative books on ECC crypto circuits, but also a co-author of several important patents describing ECC. Well, the NSA, in turn, when it launched its entire project called Suite B, previously purchased from Certicom a large (twenty-odd) package of patents covering “elliptical” cryptography.

This whole preamble was needed in order to explain why Koblitz and Menezes are precisely those people who, for natural reasons, considered themselves knowledgeable about the current affairs and plans of the NSA in the field of cryptographic information protection.

However, for them, the NSA initiative with a sharp change of course to post-quantum algorithms was a complete surprise. (!)

Back in the summer of 2015 (!) The NSA “quietly”, without explaining absolutely to anyone, removed the “P-256” ECC algorithm from its kit, while leaving it with its RSA equivalent with a 3072-bit module. Moreover, in the NSA's accompanying statements it was quite clearly said that all parties implementing the algorithms from Suite B now no longer make any sense to switch to ECC, but it is better to simply increase the RSA key lengths and wait until new post-quantum ciphers appear ...

But why? What is the reason for such a sharp rollback to the old RSA system?
full member
Activity: 224
Merit: 120
December 13, 2019, 07:37:28 AM
#5
This could not be a threat, although there are numerous powerful super computers nowadays, encryptions are made in crypto to completely encrypt data. I know a bit in hashing but I'm not a computer knowledgeable person. I believe, what we are using are hashing algorithms that primarily not allowing the data to be decrypted going back to its source. And that technology makes it the most secured and reliable to people. Soon, these powerful supercomputers will not be focused on decrypting already existing data, but mainly in a purpose of creating stronger encryption.
--------------------
The blockchain has two reliability technologies: hashing (and the Merkle tree) and a digital signature on cryptography on elliptic curves.
Hashing, I do not question.
And cryptography of elliptic curves - I expose. And not because I'm an expert. But because specialists with world names “refuse” it, not all, but those who did the research. Check out these facts:

"The discovery was not made by full-time employees of GCHQ (the British intelligence unit), but by the mathematicians of the CESG unit, which is responsible for national ciphers and the protection of government communications systems in the UK.

The close interaction between the GCHQ and the NSA is taking place primarily along the lines of joint intelligence activities.

In other words, since the NSA also has its own IAD (Information Assurance Directorate) department specializing in the development of cryptographic algorithms and information protection, the discovery of British colleagues was a complete surprise for the mathematicians of this unit.

Blockchain is hanging by a thread. The blockchain is saved by the non-compromised hashing function and its massive use and decentralization technology.

The most secret and powerful special service in the world (USA) back in 2015 FORBIDDEN to use ESA on which the SDC is based in Bitcoin.

This organization just does nothing.
legendary
Activity: 3080
Merit: 1353
December 13, 2019, 05:40:17 AM
#4
Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.

LOL, do you think that quantum computers will be mass produces if ever they successfully crack 2^256 code? so it will not be for everyone's used. And for the record, there are a lot of development from behind. So far the following are candidates.

[1] Lamport Signature - (https://en.wikipedia.org/wiki/Lamport_signature#Public_key_for_multiple_messages)

[2] Multivariate cryptography - (https://en.wikipedia.org/wiki/Multivariate_cryptography)

[3] Lattice-based cryptography - (https://en.wikipedia.org/wiki/Lattice-based_cryptography)

for the record though, bitcoin addresses are not at risk to attack not unless the attacker know your public key. The only way to attack us is that if the QC is fast enough to obtain our public key in a few minutes based on our private key.
legendary
Activity: 3234
Merit: 1214
Vave.com - Crypto Casino
December 13, 2019, 05:26:49 AM
#3
Google has come up with quantum supremacy through which calculations can be performed in a very short time and the same can't be cracked by the conventional conputer used all around.

This serves to be a tool in the hands of hackers, criminals to crack blockchain based cryptocurrencies like bitcoin ans others to be the targets. Also it is stated to crack the encryption upon which the internet is built on. Later news revealed it isn't that powerful to crack bitcoin. Right now it has got only 53 qbits, to crack the bitcoin there is need for at least 1500 qbits. This way no nees to fear about the encryption of the algorithm.
sr. member
Activity: 966
Merit: 274
December 13, 2019, 05:20:35 AM
#2
This could not be a threat, although there are numerous powerful super computers nowadays, encryptions are made in crypto to completely encrypt data. I know a bit in hashing but I'm not a computer knowledgeable person. I believe, what we are using are hashing algorithms that primarily not allowing the data to be decrypted going back to its source. And that technology makes it the most secured and reliable to people. Soon, these powerful supercomputers will not be focused on decrypting already existing data, but mainly in a purpose of creating stronger encryption.
full member
Activity: 224
Merit: 120
December 13, 2019, 04:54:00 AM
#1
Asymmetric cryptography.
It is it that makes it possible to generate encryption keys for symmetric cryptography.

Transmission, encryption of information is carried out (in most cases) by symmetric cryptographic systems. Because they are much more reliable, less for a key, less load on computing power and the like. But the main thing is reliability.

But in this reliable system, there is an unreliable element, the most important element, an asymmetric system.

Everyone calmed down. No problems. Everything is reliable. But why then the specialized organizations responsible for the "reliability of cryptography" are looking for something, obviously, they are not happy with something.

Why do recognized authorities of cryptographic science give such ambiguous definitions as "conditionally reliable cryptography".

It is interesting to talk about the known facts of the rejection of some asymmetric systems and the intensified search for new ones.

Mathematicians know that all modern asymmetric cryptography is based on unproven mathematical statements. Simply put, from a scientific point of view, only on hypotheses. On unsubstantiated assumptions. It’s good that we know which ones.
 
And cryptography on elliptic curves, which is part of blockchain technology (digital signature), has overgrown with obscure facts. On the one hand, we recommend it for domestic use, on the other hand, it is forbidden to use it in serious matters.

There is an opinion of cryptographers that any system with a public and private key will be hacked sooner or later, and then all your secrets will become known. You save them now (they recommend cryptography on elliptic curves!), And then they will open everything. Well, not a fact.

This is just a danger. And it's not about the progress of quantum computing and (the main nuisance) the provision of these services to anyone, for money, over the network.

But it's not that. Brute-force attack is the fate of the monkey. We are all a little monkeys, we are all afraid of a quantum computer and a complete search. This is not the worst, the keys can be increased and generally go into even larger numerical fields.

 But the main danger is cryptanalysis. He is developing.
The life of a cryptanalyst is like that of a secret agent. Even his family does not know about his real job.
I wonder why such a conspiracy.

The author is committed to the idea that if such “researchers” of asymmetric systems find something, then they will never tell us about it. Or didn’t they already say?

I would like to talk about this and much more in this topic directly relating to our security.
Pages:
Jump to: